Podcast
Questions and Answers
What can be inferred from the firewall log information?
What can be inferred from the firewall log information?
- The victim's IP address is 136.127.92.171
- A botnet DDoS attack was blocked
- The Trojan was blocked, but the file was not
- A download was blocked from a web server (correct)
What would be the MOST likely reason for the message 'Your connection is not private'?
What would be the MOST likely reason for the message 'Your connection is not private'?
- Brute force
- DoS
- Disassociation
- On-path (correct)
What would be the BEST way to provide a website login using existing credentials from a third-party site?
What would be the BEST way to provide a website login using existing credentials from a third-party site?
- Federation (correct)
- PEAP
- EAP-FAST
- 802.1X
Which term would BEST describe the expected frequency of firewall hardware failure between repairs?
Which term would BEST describe the expected frequency of firewall hardware failure between repairs?
What would be the BEST way to prevent data exfiltration using external storage drives?
What would be the BEST way to prevent data exfiltration using external storage drives?
What category BEST describes devices vulnerable to remote control by a third-party?
What category BEST describes devices vulnerable to remote control by a third-party?
Which standard provides information on privacy and managing Personally Identifiable Information (PII)?
Which standard provides information on privacy and managing Personally Identifiable Information (PII)?
In the context of preventing data exfiltration, what would be the LEAST effective method?
In the context of preventing data exfiltration, what would be the LEAST effective method?
Which technology would be most suitable for ensuring that login access is only available if a person is physically within the same building as the server?
Which technology would be most suitable for ensuring that login access is only available if a person is physically within the same building as the server?
In which order should a security administrator collect the most volatile data before powering down the database servers to respond to a potential security breach?
In which order should a security administrator collect the most volatile data before powering down the database servers to respond to a potential security breach?
What is the purpose of using a SHA256 hash value provided alongside an ISO download link?
What is the purpose of using a SHA256 hash value provided alongside an ISO download link?
What would be the BEST way to ensure that login access should only be available if a person is physically within the same building as the server?
What would be the BEST way to ensure that login access should only be available if a person is physically within the same building as the server?